Reports Search Reports Spatial Search Risk-cases Search Risk-cases Graph Traversal
128 results found in 14 ms Page 5 of 13
Report on the government’s processing of confidential data on persons and companies
Rigsrevisionen has examined how eight government institutions process confidential data on persons and companies in 11 selected IT systems. The report is based on IT audits carried out in connection ... with the annual audit in the spring 2014. The purpose of the audit was to assess whether confidential data on persons and companies are adequately protected by the government institutions. ... ... Inadequate protection of confidential data ... If a government institution does not protect confidential data to the extent necessary, the risk that third parties get unauthorized access to the data is very high. In opinion of the Danish SAI ... , inadequate protection of confidential data may also erode the citizens’ and companies’ confidence in government data security. That may eventually become a barrier for the continued efforts to implement ... e-government and make government administration more efficient.
Full description
National Audit Office of Denmark , issued in 2014
Risk cases: 2
Copyright Office Needs to Develop Plans that Address Technical and Organizational Challenges
The mission of the Copyright Office, a service unit within the Library of Congress, is to promote creativity by administering and sustaining a national copyright system. As part of this mission ... , the Copyright Office registers about 500,000 creative works a year for copyright and records documentation related to copyright transfer and sale. In recent years, the Register of Copyrights has discussed ... the need for a modernized Copyright Office, to include upgrades to the current IT environment. ... No justified investments without IT strategy ... difficult to solve practical problems, but it can also put the overall mission of the Office at risk. ... GAO shows in its report on the US Copyright Office, what is a role of IT strategy in organisaion. Effects can be found at the bottom and at the top: the lack of strategic plan can make it more
Full description
General Accountability Office , issued in 2015
Risk cases: 2
Operation of the Record Systems Applied in the Eligibility Scheme of Benefits and Services Provided from the Social Security Funds
Hungarian SAI evaluated the set-up and operation of the basic registries of managing bodies (National Health Insurance Fund, Central Administration of National Pension Insurance, National Tax ... and Customs Administration), as well as the dataflow amongst them. In addition, the control system of fulfilling the data provision obligation was evaluated, as well as the IT support activities and whether ... the records had proven reliable in supporting services in compliance with eligibilities and in filtering unjustified services. The audited period covered the years 2007-2010. ... ... Well considered regulations are essential for good quality data ... State Audit Office of Hungary.has proved that date safety may depend on quality of regulations. The report on record systems of social security services casted light on risk connected with huge data ... bases managed by different entities, in a changing legal environment.
Full description
State Audit Office of Hungary , issued in 2012
Risk cases: 2
Cyber Attacks: Securing Agencies’ICT Systems
responsibility of agencies, having regard to their business operations and specific risks. In the context of a national government, those risks can range from threats to national security through to the disclosure ... Cyber crime is an international problem, and it is estimated that in 2012, 5.4 million Australians fell victim to such crimes, with an estimated cost to the economy of $1.65 billion ... . In the government sector, the Australian Signals Directorate (ASD)3 has estimated that between January and December 2012, there were over 1790 security incidents against Australian Government agencies. Of these, 685 ... ... Cyber-security strategy needs consistent implementation and periodic reviews ... List of 35 mitigation controls against cyber intrusions are a basic tool of information security strategy of the Australian Government. Top four are: 1. application whitelisting, 2. patching ... application, 3. patching operating systems, 4. minimising administrative privileges. Analysis by the ANAO helps to fill gaps and to direct next steps.
Full description
The Australian National Audit Office , issued in 2014
Risk cases: 3
Audit of the key ICT project federal GEVER programme Federal Chancellery
During the first stage, two new GEVER (electronic records and process management) products were procured in an open WTO tender within the framework of the two-product strategy (federal GEVER WTO ... procurement project). CHF 1.6 million was spent on these. The departments and Federal Chancellery (departments/FCh) had to choose one of the two products within three months of the contract being awarded. ... ... Advanced process management system's cost-effectiveness and deadlines at risk ... Ever since 1990, sequential controls and file management have been part of the Federal Administration's IT landscape (GEVER business administration). Significant obstacles have to be overcome ... in order to ensure the successful creation and introduction of GEVER. Previous efforts did not have any widespread success and led to a diverse GEVER landscape. The federal GEVER project has now laid ... the foundations for simplification and centralisation.
Full description
Swiss Federal Audit Office , issued in 2015
Risk cases: 2
Open Government Data - Are all exceptions to the principle of cost-free access and reuse legitimate?
models for all existing fee regimes applied to the use of public data, notably by auditing the relevant costs and revenue" and has entrusted to me the task of providing input for that assessment ... The United Kingdom, a country seen, like the United States, as a pioneer in open public data, has estimated at £6.8bn (€7,9bn) the revenue in 2010 and 2011 generated for British society by open ... public data, of which £5bn (€5.8bn) is profit. As an example, a start-up has highlighted the existence of areas in which massive savings can be made by analysing prescriptions of patented drugs ... ... Open data strategy should decide the costs problem ... French Cour des comptes presents analysis on implementation of the open data practice across the administration. Massive savings are expected, when public access to large amounts of highquality data ... is made easy. France is among the pioneers and countries making the most rapid progress in this domain. Charges for the reuse of the public information has been identified as the main problem.
Full description
Cour des comptes , issued in 2013
Risk cases: 1
The Ministry of the Environment lacks a compact information system and still uses 125 separate information systems and databases
of the MoE. The audit identified the following risks: (1) non-existence of the Integrated environmental information system (IEIS) as an independent information system; (2) purchase of ICT, within the budget ... The objective of the audit was to scrutinise the management of funds earmarked for the purchase and administration of ICT within the MoE and selected organisations which come under the management ... chapter of the MoE, through a state co-funded organisation CENIA which comes under the management of the MoE; (3) utilisation of the information systems. The audited period was 2010 to 2013; where relevant ... ... Ministry of the Environment manages 125 information systems and databases ... The Ministry of the Environment (MoE) has for more than 20 years a legal obligation to administer and manage an Integrated Environmental Information System (IEIS). In spite of this fact, the existing ... systems (more than 125 information systems and databases) are designed, implemented and managed as individual information systems without a direct integration into a joint point of reference.
Full description
Supreme Audit Office of Czech Republic , issued in 2015
Risk cases: 7
Opportunities Exist for SEC to Improve Its Controls over Financial Systems and Data
The SEC is responsible for enforcing securities laws, issuing rules and regulations that provide protection for investors, and helping to ensure that the securities markets are fair and honest ... . In carrying out its mission, the SEC relies on computerized information systems to collect, process, and store sensitive information, including financial data. Having effective information security controls ... in place is essential to protecting these systems and the information they contain. <br/> This report details weaknesses GAO identified in the information security program at SEC during its audit ... IT security basics under scrutiny ... be compromised, because of risks jeopardizing the confidentiality, integrity, and availability of sensitive financial information. ... Financial audit by US GAO was accompanied by an IT examination focused on information security measures in the Securities and Exchange Commission (SEC). GAO found that SEC’s systems could
Full description
General Accountability Office , issued in 2016
Risk cases: 5
Performance Audit of the Georgian Government electronic Procurement system
of a high-quality service has a particular importance. <br /> It is noteworthy that establishment of open, transparent and competitive environment for the procurement parties mitigates the risks of corruption ... State procurement is one of the key components of public financial management. Its share in state budget is approximately 25 percent. Effective management of state procurements is an important sphere ... of interest for the State Audit Office. Considering the fact that since 2010 major part of public procurements is being conducted electronically and there is no alternative tool, uninterrupted provision ... ... Electronic procurement system - how effective are management and control mechanisms? ... SAI Georgia analyzed the electronic Government Procurement system. In their report they focus on compliance and security problems, which may harm the business goals and overall mission of the system.
Full description
State Audit Office Of Georgia , issued in 2016
Risk cases: 5
Management and implementation of 1BestariNet
1BestariNet Service Project (1BestariNet) is an initiative undertaken by the Malaysian Ministry of Education (MOE) to replace and enhance ICT connectivity in schools. It is an enhancement ... to the SchoolNet service which terminated on 31 December 2010 with emphasis on end-to-end solutions (E2E) network services together with Virtual Learning Environment (VLE). Under this project, 10,000 primary ... and secondary public schools in Malaysia are equipped with high-speed 4G Internet access and a virtual learning platform, providing high-speed internet connectivity and access to a world-class Integrated Learning ... ... To answer big risks in IT systems development you need all levels of organisation ... Audit of 1BestariNet is presented by the Malaysian National Audit Department together with other IT projects reviewed. A result is this concise and instructive list of lessons learnt and failures ... to be avoided. To maximize performance and minimize vendor lock-in you need a lot of concerted effort by top and line management, as well as users ready to work with new tools.
Full description
National Audit Department of Malaysia , issued in 2013
Risk cases: 4
previous 128 results found. Page 5 of 13 next